N-Cryptographic Multilevel Algorithm for Effective Information Security


  • Olawale S Adebayo
  • Morufu Olalere
  • Amit Mishra LECTURER IN I.B.B.UNIV. Niger State
  • Joel N. Ugwu
  • M. A. Mabayoje




Encryption, Cryptography, n-cryptographic algorithms, Cryptanalysis, Multilevel Algorithm


Security of information cannot be perfectly realized as both it and its counter technology continue to evolve.  In the same vein, using a single cryptographic cipher to realize information secrecy is not enough as it can be broken over time, thus revealing the information in plaintext. Most of the existing cryptographic ciphers possess a minimal level of weakness, which is exploitable over time, but when this algorithmic transformation is used in multiple times, the number of trials, effort, and time required to exploit it become greater. This paper proposes a multilevel algorithm for realizing the security of information using a multiple-cryptographic ciphers process. It presents the possibility of combining n-cryptographic ciphers in a single implementation within the system, permitting n-cryptographic transformation to take place during the encryption and decryption processes.


T. A. Akinwale, F. A. Adekoya, and E. O. Ooju, “Multi-Level Cryptographic Functions for the Functionalities of Open Database System”. Computer Technology and Application 2 (2011), Pp. 730-735, 2011.

J.S. Gustavus, “Symmetric and Asymmetric Encryption”. Computing Survey. Vol. 2 (4), pp. 321, 1979.

J. N. Ugwu, “Multilevel Offline Cryptography Support System”. Undergraduate Project, Federal University of Technology, Minna, Nigeria, 2014.

W. Judy “Notes from her Math 398 course taught in the Spring of 2002 at UNL”. Ericsson AB, ERLANG Secure Socket Layer 5.1.1., 2002.

L. Harn and H. Lin, “A cryptographic Key Generation scheme for multilevel Data Security”. Computers & Security, 9 (6) 539-546. Computer Science Telecommunication program, University of Missouri-Kansas City, Kansas city MO, U.S.A, 1990.

M. Satti and K. Subhash, “Multilevel Indexed Quasigroup Encryption for Data and Speech”. IEEE Transaction Broadcasting 2009. Authorized Licence use to: Oklahoma State University, 2009.

N. S. Sikarwar, “An Integrated Synchronized Protocol for Secure Information Transmission derived from Multilevel Steganography and Dynamic Cryptography”. International Journal of Computer Science and Telecommunication, Vol. 3(4), 2012.

A.M. Richard “Codes The Guide to Secrecy from Ancient to Modern Times, Discrete Mathematics and Its Applications’. Taylor & Francis Group, LLC Chapman & Hall/CRC, an imprint of Taylor & Francis Group, 2005.

R. K. Gawande, P. S. Kulkani and K. A. Ganar, “Multilevel Image Encryption using Chaotic Mapping and Elliptic Curve Cryptography”. International Conference of engineering Innovation and Technology. ISBN: 978-93-81693-77-3; Nagpur, 2012.

S. G. Akl and P. D. Taylor, “Cryptographic solution to a multilevel security problem”. Proc. Cryp~o-82, Sanla Barbara, CA, AU~USI 23-25, pp. 237-250, 1982.

S. Chaitanya, B. Urgaonkar, A. Sivasubramaniam, “Multi-Level Crypto Disk: Secondary Storage with Improved Performance vs Security Trade-offs”. Technical Report CSE-09-006, 2006.

T. Hardjono and J. Seberry, “A multilevel Encryption Scheme for Database Security”, Department of Computer Science, University College, The University of South Whales. Australian Defense Force Academy Canberra, A.C.T., 2600, 1989.

D. G. Usha and R. S. D. Wahida Banu, ‘Secure Multilevel Cryptography Using Graceful Codes’. International Journal of Information and Electronics Engineering, Vol. 2(5). 2012.

O. S. Adebayo, V. O. Waziri (PhD), J.A Ojeniyi, S. A. Bashir, A. Mishra, ‘Information Security on The Communication Network In Nigeria Based On Digital Signature’. International Journal of Computer Science & Information Security (IJCSIS)’. Vol. 10 (11), pp. 57-63. ISSN 1947-5500, 2012.




How to Cite

Adebayo, O. S., Olalere, M., Mishra, A., Ugwu, J. N., & Mabayoje, M. A. (2014). N-Cryptographic Multilevel Algorithm for Effective Information Security. Transactions on Networks and Communications, 2(5), 147–155. https://doi.org/10.14738/tnc.25.504